Abstract
This chapter gives an overview of the fundamental concepts and formalism with respect to formal analysis and verification of security protocols that will be used in the rest of the book. Some recent studies into developing new formal methods to cope with the emerging issues and threats in this research field are also introduced to make clear the challenge in front of us and the current situation.
This chapter is organized as follows. In Section 2.1, we start with introducing some basic concepts, including the notations and terminology used in the book. Section 2.2 presents several security protocols, security service provided by protocols and principles of cryptography. In Section 2.3, we introduce the research into analysis and verification of security protocols. These are classified into different categories based on their specific purposes and theoretical foundation. Section 2.4, Section 2.5, Section 2.6 and Section 2.7 describe the attack-construction approach, inference-construction approach, proof-construction approach and other approaches using formal tools and languages, respectively. Finally, we summarize this chapter in Section 2.8.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Chen, Q., Zhang, C., Zhang, S. (2008). Overview of Security Protocol Analysis. In: Secure Transaction Protocol Analysis. Lecture Notes in Computer Science, vol 5111. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85074-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-540-85074-8_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85073-1
Online ISBN: 978-3-540-85074-8
eBook Packages: Computer ScienceComputer Science (R0)